Works matching DE "IDENTITY management systems"
1
- Applied Sciences (2076-3417), 2025, v. 15, n. 15, p. 8589, doi. 10.3390/app15158589
- Paredes-García, Daniel;
- Fernández-Carrasco, José Álvaro;
- López, Jon Ander Medina;
- Vasquez-Correa, Juan Camilo;
- Yoldi, Imanol Jericó;
- Moreno-Acevedo, Santiago Andrés;
- González-Docasal, Ander;
- Irazusta, Haritz Arzelus;
- Muniain, Aitor Álvarez;
- Loinaz, Yeray de Diego
- Article
2
- Majlesi Journal of Electrical Engineering, 2025, v. 19, p. 1, doi. 10.57647/j.mjee.2025.1902.44
- Kommuri, Venkatrao A.;
- Shaik, Kareemulla B.
- Article
3
- Communications of the Association for Information Systems, 2014, v. 34, p. 843, doi. 10.17705/1CAIS.03446
- Article
4
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 656
- Khan, Shah Nawaz;
- Mishra, Saurabh;
- Nautiyal, Abhishek;
- Thakur, Payal
- Article
5
- Grenze International Journal of Engineering & Technology (GIJET), 2021, v. 7, n. 1, p. 342
- Madanbhavi, Lalitha;
- Sawant, Abhishek D.;
- Bharamagoudar, Geeta R.;
- N., Nihal;
- Patil, M. R.;
- S., Minal;
- G. S., Himanshu
- Article
6
- Ingénierie des Systèmes d'Information, 2025, v. 30, n. 5, p. 1297, doi. 10.18280/isi.300516
- Maidine, Khalid;
- EL-Yahyaoui, Ahmed;
- Trichni, Salima
- Article
7
- Computer Engineering & Science / Jisuanji Gongcheng yu Kexue, 2025, v. 47, n. 6, p. 1008, doi. 10.3969/j.issn.1007-130X.2025.06.007
- Article
8
- Africa Policy Journal, 2022, p. 66
- Article
9
- Journal of Systems Integration (1804-2724), 2014, v. 5, n. 3, p. 67
- Węckowski, Dawid Grzegorz;
- Schmidt, Paweł
- Article
10
- Middle East Report, 2024, n. 313, p. 1
- Article
11
- Security & Communication Networks, 2021, v. 2021, p. 1, doi. 10.1155/2021/7314823
- Farhi, Lubna;
- Abbasi, Hira;
- Rehman, Rija
- Article
12
- Romanian Review Precision Mechanics, Optics & Mecatronics, 2014, n. 45, p. 137
- Article
13
- Journal of Social Distress & the Homeless, 2011, v. 20, n. 3/4, p. 125, doi. 10.1179/105307811805472738
- Article
14
- International Journal of Online Engineering, 2018, v. 14, n. 4, p. 58, doi. 10.3991/ijoe.v14i04.8374
- Dexin Zhu;
- Xiaohui Li;
- Xiaohong Li;
- Rongkai Wei;
- Jianan Wu;
- Lijun Song
- Article
15
- Information Resources Management Journal, 2012, v. 25, n. 3, p. 98, doi. 10.4018/irmj.2012070105
- Jahrisch, Martin;
- Dietz, Gunnar
- Article
16
- Information Resources Management Journal, 2012, v. 25, n. 3, p. 61, doi. 10.4018/irmj.2012070103
- Viviani, Marco;
- Bennani, Nadia;
- Egyed-Zsigmond, Elöd
- Article
17
- Information Resources Management Journal, 2012, v. 25, n. 3, p. 1, doi. 10.4018/irmj.2012070101
- Ng, Alex;
- Watters, Paul;
- Chen, Shiping
- Article
18
- EURASIP Journal on Wireless Communications & Networking, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13638-018-1143-0
- Faisal, Mohammad;
- Abbas, Sohail;
- Ur Rahman, Haseeb
- Article
19
- Review of Public Personnel Administration, 2012, v. 32, n. 4, p. 332, doi. 10.1177/0734371X12453055
- Ng, Eddy S.W.;
- Schweitzer, Linda;
- Lyons, Sean T.
- Article
20
- Bibliothek Forschung und Praxis, 2023, v. 47, n. 3, p. 542, doi. 10.1515/bfp-2023-0063
- Bauknecht, Cornelius;
- Erndt, Michael
- Article
21
- Multimedia Tools & Applications, 2021, v. 80, n. 8, p. 11723, doi. 10.1007/s11042-020-10271-3
- ElAraby, M. E.;
- Shams, M. Y.
- Article
22
- KnE Social Sciences, 2025, p. 92, doi. 10.18502/kss.v10i16.19157
- Anto;
- Mappasere, Fatmawati A.;
- Abdi;
- Alyas
- Article
23
- Systems, 2022, v. 10, n. 2, p. N.PAG, doi. 10.3390/systems10020039
- Venkatraman, Sitalakshmi;
- Parvin, Sazia
- Article
24
- Infosfera: Journal of Security Studies & Defense Intelligence, 2023, v. 15, n. 3, p. 62
- Article
25
- Feminist Media Studies, 2012, v. 12, n. 4, p. 506, doi. 10.1080/14680777.2012.741867
- Martinez, InmaculadaJ.;
- Aguado, JuanMiguel;
- Tortajada, Iolanda
- Article
26
- Cataloging & Classification Quarterly, 2023, v. 61, n. 7/8, p. 735, doi. 10.1080/01639374.2023.2269416
- Zhang, Erica;
- Biswas, Paromita;
- Dagher, Iman
- Article
27
- Cataloging & Classification Quarterly, 2020, v. 58, n. 7, p. 632, doi. 10.1080/01639374.2020.1815920
- Article
28
- Cataloging & Classification Quarterly, 2020, v. 58, n. 5, p. 505, doi. 10.1080/01639374.2020.1771499
- Serra, Liliana Giusti;
- Schneider, Jodi A.;
- Segundo, José Eduardo Santarém
- Article
29
- Cataloging & Classification Quarterly, 2020, v. 58, n. 3/4, p. 438, doi. 10.1080/01639374.2020.1713952
- Durocher, Michelle;
- Dagher, Iman;
- Ilik, Violeta;
- Long, Chris Evin;
- Norris, Jeanette A.;
- Quintana, Isabel del Carmen;
- Théroux, Manon
- Article
30
- Cataloging & Classification Quarterly, 2020, v. 58, n. 3/4, p. 428, doi. 10.1080/01639374.2019.1699880
- Stalberg, Erin;
- Riemer, John;
- MacEwan, Andrew;
- Liss, Jennifer A.;
- Ilik, Violeta;
- Hearn, Stephen;
- Godby, Jean;
- Frank, Paul;
- Durocher, Michelle;
- Billey, Amber
- Article
31
- Cataloging & Classification Quarterly, 2013, v. 51, n. 4, p. 404, doi. 10.1080/01639374.2012.756843
- Article
32
- 2020
- Bouras, Mohammed Amine;
- Qinghua Lu;
- Fan Zhang;
- Yueliang Wan;
- Tao Zhang;
- Huansheng Ning
- Literature Review
33
- 2018
- Elrod, James K.;
- Fortenberry, John L.;
- Fortenberry, John L Jr
- journal article
34
- Psychology & Marketing, 2024, v. 41, n. 10, p. 2355, doi. 10.1002/mar.22057
- Lv, Linxiang;
- Kang, Khloe Qi;
- Liu, Guanrong
- Article
35
- Wireless Personal Communications, 2022, v. 123, n. 4, p. 3719, doi. 10.1007/s11277-021-09310-5
- Geetha, R.;
- Padmavathy, T.;
- Umarani Srikanth, G.
- Article
36
- International Journal of Information Security & Cybercrime, 2019, v. 8, n. 1, p. 45, doi. 10.19107/ijisc.2019.01.06
- Bisegna, Andrea;
- Carbone, Roberto;
- Martini, Ivan;
- Odorizzi, Valentina;
- Pellizzari, Giulio;
- Ranise, Silvio
- Article
37
- International Development Planning Review, 2019, v. 41, n. 1, p. 43, doi. 10.3828/idpr.2018.10
- Turner, Sarah;
- Hạnh, Ngô Thúy
- Article
38
- Computer Law Review International, 2022, v. 23, n. 6, p. 165, doi. 10.9785/cri-2022-230602
- Zirnstein, Yannick;
- Lin Lee, Yue;
- Ge, Amanda
- Article
39
- International Journal of Information Security Science, 2022, v. 11, n. 1, p. 1
- Article
40
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1231, doi. 10.1007/s10207-023-00688-w
- Grüner, Andreas;
- Mühle, Alexander;
- Lockenvitz, Niko;
- Meinel, Christoph
- Article
41
- International Journal of Information Security, 2014, v. 13, n. 6, p. 529, doi. 10.1007/s10207-014-0235-z
- Veeningen, Meilof;
- Weger, Benne;
- Zannone, Nicola
- Article
42
- International Journal of Information Security, 2014, v. 13, n. 2, p. 199, doi. 10.1007/s10207-014-0230-4
- Nuñez, David;
- Agudo, Isaac
- Article
43
- International Journal of Information Security, 2013, v. 12, n. 3, p. 173, doi. 10.1007/s10207-012-0189-y
- Dólera Tormo, Ginés;
- López Millán, Gabriel;
- Martínez Pérez, Gregorio
- Article
44
- Computer Journal, 2016, v. 59, n. 11, p. 1669, doi. 10.1093/comjnl/bxw030
- JUNQING GONG;
- XIAOLEI DONG;
- ZHENFU CAO;
- JIE CHEN
- Article
45
- 2025
- Goel, Aviral;
- Rahulamathavan, Yogachandran
- Literature Review
46
- Future Internet, 2024, v. 16, n. 5, p. 176, doi. 10.3390/fi16050176
- Fiaz, Faisal;
- Sajjad, Syed Muhammad;
- Iqbal, Zafar;
- Yousaf, Muhammad;
- Muhammad, Zia
- Article
47
- Juridical Current, 2015, v. 18, n. 2, p. 118
- Article
48
- Journal of Network & Systems Management, 2012, v. 20, n. 4, p. 513, doi. 10.1007/s10922-012-9244-2
- Arias-Cabarcos, Patricia;
- Almenárez-Mendoza, Florina;
- Marín-López, Andrés;
- Díaz-Sánchez, Daniel;
- Sánchez-Guerrero, Rosa
- Article
49
- International Journal of Human Resource Management, 2017, v. 28, n. 8, p. 1119, doi. 10.1080/09585192.2016.1166785
- Berger, Laura J.;
- Essers, Caroline;
- Himi, Abdelmajid
- Article